Welcome!

News Feed Item

New Law Protects Pennsylvanians Recovering Lost Money and Items

Unclaimed Property "Finders" Will Be Subject to State Approval and Oversight

HARRISBURG, PA--(Marketwired - August 04, 2014) - At the urging of state Treasurer Rob McCord, legislation enacted this month will guard Pennsylvanians against fraud and deceptive practices when they employ a service to help them claim their money or property that has been turned over to the state.

With changes made through the Fiscal Code bill (Act 126 of 2014), new sections were added to the state's unclaimed property law allowing the Treasury to oversee those who for a fee assist others in locating and recovering unclaimed property -- commonly known as "finders." People engaging in that business will be required to apply for approval, register, and remain subject to Treasury oversight. McCord stressed that Pennsylvanians, businesses and other organization can always claim their property for free directly from the state Treasury Department.

"The vast majority of finders operate within the law, and they can provide a valuable service to some people who may either not know they have unclaimed property, or need help to retrieve it," McCord said. "Unfortunately, however, a relative few take advantage of those who are not fully aware of their rights."

Under long-standing Pennsylvania law, finders are permitted to charge up to 15 percent of the amount they help to claim. Treasury has regularly seen instances, however, of some finders charging a higher percentage, illegally adding additional fees on top of the allowable percentage, or fraudulently claiming the money or property themselves and passing only a small portion on to the rightful owner.

"We've seen some heartbreaking examples of people who desperately could have used the money they had coming to them, but instead sacrificed an excessively large share of it to an unscrupulous finder," McCord said.

McCord reiterated that for no charge, anyone can contact the state Treasury to check if they have unclaimed property, and initiate a claim. They can do so by visiting www.patreasury.gov or by calling toll free at 1-800-222-2046 Monday through Friday, 7:30 a.m. to 4:30 p.m. where a member of Treasury's Return Team will assist them.

Actions of some finders operating outside the law have required Treasury investigators and legal staff to invest considerable time and resources aiding and protecting citizens who have been defrauded, including making court appearances on some occasions. Often, Treasury staff has been forced to pursue cases that involve repeat offenders. McCord approached the legislature this year with suggested remedies that would permit Treasury to crack down on illegal operators while not heavily burdening those who abide by the law.

Under the new provisions, no person may act as a finder without first applying for and receiving a certificate of registration with the state Treasury. When submitting an application, finders will have to attest under penalty of perjury that they have not been convicted of a felony or certain other criminal offenses within 10 years and that they are not under investigation for such crimes, and agree to a background check to verify the information. Treasury will issue a registration certificate and number valid for two years, after which registration can be renewed. Treasury can also revoke, suspend or refuse to renew a registration under certain conditions and after due process. Finders violating the law will be subject to fines of up to $1,000 for a first offense and up to $5,000 for a subsequent offense. (More detail about the new sections of the law can be viewed here.)

Under the unclaimed property law, which was first enacted in 1929, Treasury each year receives millions of dollars in unclaimed property in the form of abandoned bank accounts, forgotten stocks, unclaimed insurance benefits, uncashed checks, contents of safe deposit boxes, and other sources of money or tangible items. 

Since January 2009, the McCord Treasury has received $1.3 billion in property and returned more than $572 million to rightful owners.

For more information, visit www.patreasury.gov.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for s...
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
"We are a custom software development, engineering firm. We specialize in cloud applications from helping customers that have on-premise applications migrating to the cloud, to helping customers design brand new apps in the cloud. And we specialize in mobile apps," explained Peter Di Stefano, Vice President of Marketing at Impiger Technologies, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself. Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, discussed how VPaaS enables you to move fast, creating scalable video experiences that reach your aud...
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.